Is there an app I can run in the vmware box to generate various traffic?
On Fri, Mar 26, 2010 at 5:36 PM, luan nguyen <luan_at_netcraftsmen.net> wrote:
>
>
> A couple of VMs should be enough.
>
> ------------------------------
> From: Mark Matters <markccie_at_gmail.com>
> Sent: March 26, 2010 4:35 PM
>
> To: luan nguyen <luan_at_netcraftsmen.net>
> Cc: Charles.Henson_at_regions.com; ccielab_at_groupstudy.com; Marko Milivojevic
> <markom_at_ipexpert.com>; Narbik Kocharians <narbikk_at_gmail.com>;
> nobody_at_groupstudy.com
>
> Subject: Re: Protection against Man-in -d -middle attack
>
> I'm curious how would you go about simulating a large amount of users to
> make this as realistic as possible? Also I don't this command is available
> in the IOS's that I have used for dynamips.
>
> On Fri, Mar 26, 2010 at 4:05 PM, luan nguyen <luan_at_netcraftsmen.net>wrote:
>
>> Hey Charles.
>>
>> Great thing about working at Netcraftsmen is collectively we've seen
>> almost all problems.
>> This can be done using a home network or dynamips and WM.
>>
>> -Luan
>>
>>
>>
>> -----Original Message-----
>> From: Charles.Henson_at_regions.com
>> Sent: March 26, 2010 3:28 PM
>> To: Luan Nguyen <luan_at_netcraftsmen.net>
>> Cc: ccielab_at_groupstudy.com; 'Marko Milivojevic' <markom_at_ipexpert.com>;
>> 'Narbik Kocharians' <narbikk_at_gmail.com>; nobody_at_groupstudy.com
>> Subject: RE: Protection against Man-in -d -middle attack
>>
>> Luan,
>> Respectfully, aren't we being a little tough for a volunteer driven
>> GS? You're at NetCraftsmen. Have you labbed it up?
>>
>>
>> Charles Henson
>>
>>
>>
>>
>>
>> |------------>
>> | From: |
>> |------------>
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |"Luan Nguyen" <luan_at_netcraftsmen.net>
>> |
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |------------>
>> | To: |
>> |------------>
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |"'Marko Milivojevic'" <markom_at_ipexpert.com>
>> |
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |------------>
>> | Cc: |
>> |------------>
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |"'Narbik Kocharians'" <narbikk_at_gmail.com>, <ccielab_at_groupstudy.com>
>> |
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |------------>
>> | Date: |
>> |------------>
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |03/26/2010 02:21 PM
>> |
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |------------>
>> | Subject: |
>> |------------>
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>> |RE: Protection against Man-in -d -middle attack
>> |
>>
>> >--------------------------------------------------------------------------------------------------------------------------------------------------|
>>
>>
>>
>>
>>
>> You can talk the talk, but everything needs to be tested out in a lab
>> first
>> before implement...no matter how much is the amount of planning! That's
>> how I always do thing anyway, from a simple thing like this DAI problem to
>> complex voice, NAC with ASA for VPN...etc.
>> What happen to all the existing DHCP clients? How do you create the DHCP
>> leasing info? What's the best way of getting it without disrupting the
>> users?...etc. Be less general.
>>
>> " Anything can be done with the right amount of careful
>> planning and execution" sounds like coming from my corporate boss back in
>> the day...
>>
>> -----Original Message-----
>> From: Marko Milivojevic [mailto:markom_at_ipexpert.com]
>> Sent: Friday, March 26, 2010 2:56 PM
>> To: Luan Nguyen
>> Cc: Narbik Kocharians; ccielab_at_groupstudy.com
>> Subject: Re: Protection against Man-in -d -middle attack
>>
>> On Fri, Mar 26, 2010 at 18:35, Luan Nguyen <luan_at_netcraftsmen.net> wrote:
>> > That's too general :)
>> > How about labbing that up? Say a small network of 10 VM XP machines of
>> extremely bitchy client = no down time?
>>
>> I don't think I was too general. Those things are not labbed, but
>> planned. Anything can be done with the right amount of careful
>> planning and execution.
>>
>> If you need a solution for the problem, feel free to contact me offline.
>>
>> --
>> Marko Milivojevic - CCIE #18427
>> Senior Technical Instructor - IPexpert
>>
>> YES! We include 400 hours of REAL rack
>> time with our Blended Learning Solution!
>>
>> Mailto: markom_at_ipexpert.com
>> Telephone: +1.810.326.1444
>> Fax: +1.810.454.0130
>> Web: http://www.ipexpert.com/
>>
>> __________ Information from ESET NOD32 Antivirus, version of virus
>> signature database 4977 (20100326) __________
>>
>> The message was checked by ESET NOD32 Antivirus.
>>
>> http://www.eset.com
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Fri Mar 26 2010 - 21:12:10 ART
This archive was generated by hypermail 2.2.0 : Thu Apr 01 2010 - 07:26:36 ART